{"id":43373,"date":"2017-06-01T16:00:00","date_gmt":"2017-06-01T16:00:00","guid":{"rendered":"http:\/\/sticky-highjinx.flywheelsites.com\/?p=43373"},"modified":"2025-03-03T08:18:47","modified_gmt":"2025-03-03T13:18:47","slug":"it-security-threats-in-the-office","status":"publish","type":"post","link":"https:\/\/envistacorp.com\/en-au\/2017\/06\/01\/it-security-threats-in-the-office\/","title":{"rendered":"IT Security Threats In The Office"},"content":{"rendered":"<span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 3<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>\n<p>In today\u2019s rapidly advancing technology environment, new threats emerge every day which can prove problematic to your business. If you don\u2019t consider yourself \u201ctech savvy\u201d it can be tempting to throw your hands in the air because you can\u2019t keep up with all the latest threats and how to combat them. The reality is that there are a multitude of easy ways you can make a difference for your personal and organisational security. From time to time, the enVista blog will give you a few easy-to-implement changes that can go a long way in keeping you safe.<\/p>\n\n\n\n<p>You might think that data breaches are only a concern over poorly secured networks, but it is equally plausible that something can occur within the walls of your office as well. Security doesn\u2019t just have to do with the nebulous idea of \u201ctechnology.\u201d Your own behaviours can promote a secure environment.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-tailgating\">Tailgating<\/h2>\n\n\n\n<p>A tailgating attack is the act of following an individual into a secured area in order to gain access to protected areas. While most people want to be courteous by holding doors for others, doing so may give an individual the opportunity to steal computer equipment, or deploy malicious software on a computer network. Even though this may lead to the occasional awkward interaction, this should be avoided unless you know the person in question.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Shoulder Surfing<\/h2>\n\n\n\n<p>A shoulder surfing attack is the act of an individual watching over a user\u2019s shoulder to gain access to sensitive information they would not normally have access to. Malicious users can utilize shoulder surfing to gather sensitive information such as user names or passwords. Be aware of your surroundings when accessing sensitive information on your computer to prevent users from gaining access to sensitive data they should not have.<\/p>\n\n\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"53370\" class=\"elementor elementor-53370\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-41ad0b5 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"19190\" data-id=\"41ad0b5\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"aux-parallax-section has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-61a0c0b\" data-eae-slider=\"2247\" data-id=\"61a0c0b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-inner-section elementor-element elementor-element-8e36e15 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"39665\" data-id=\"8e36e15\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"aux-parallax-section has_eae_slider elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7452533\" data-eae-slider=\"43520\" data-id=\"7452533\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3001eb9 elementor-grid-1 elementor-posts--align-left elementor-grid-tablet-1 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-posts__hover-gradient elementor-widget elementor-widget-posts\" data-id=\"3001eb9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;cards_columns&quot;:&quot;1&quot;,&quot;cards_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;cards_columns_tablet&quot;:&quot;1&quot;,&quot;cards_columns_mobile&quot;:&quot;1&quot;,&quot;cards_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.cards\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-cards elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-48087 post type-post status-publish format-standard has-post-thumbnail hentry category-white-paper tag-consumer-goods tag-distribution tag-food-beverage tag-information-technology tag-manufacturing tag-non-profit tag-private-equity tag-technology\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/web.envistacorp.com\/are-managed-service-right-for-your-business\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"471\" src=\"https:\/\/envistacorp.com\/en-au\/wp-content\/uploads\/sites\/4\/2021\/07\/image-2025-04-09T181015.055-768x471.jpg\" class=\"attachment-medium_large size-medium_large wp-image-117597\" alt=\"A brochure with a person touching a virtual network icon, titled Are Managed Services Right for Your Business? on a blue background. The brochure features enVista branding and technology-themed graphics.\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"aux-parallax-section has_eae_slider elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-9c1b27b\" data-eae-slider=\"67203\" data-id=\"9c1b27b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e128e49 elementor-grid-1 elementor-grid-tablet-1 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-posts__hover-gradient elementor-widget elementor-widget-posts\" data-id=\"e128e49\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;cards_columns&quot;:&quot;1&quot;,&quot;cards_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;cards_columns_tablet&quot;:&quot;1&quot;,&quot;cards_columns_mobile&quot;:&quot;1&quot;,&quot;cards_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.cards\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-cards elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-48087 post type-post status-publish format-standard has-post-thumbnail hentry category-white-paper tag-consumer-goods tag-distribution tag-food-beverage tag-information-technology tag-manufacturing tag-non-profit tag-private-equity tag-technology\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/web.envistacorp.com\/are-managed-service-right-for-your-business\" tabindex=\"-1\" target=\"_blank\"><div class=\"elementor-post__thumbnail\"><img decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/envistacorp.com\/en-au\/wp-content\/uploads\/sites\/4\/2021\/07\/image-2025-04-09T181015.055-300x300.jpg\" class=\"attachment-medium size-medium wp-image-117597\" alt=\"A brochure with a person touching a virtual network icon, titled Are Managed Services Right for Your Business? on a blue background. The brochure features enVista branding and technology-themed graphics.\" srcset=\"https:\/\/envistacorp.com\/en-au\/wp-content\/uploads\/sites\/4\/2021\/07\/image-2025-04-09T181015.055-300x300.jpg 300w, https:\/\/envistacorp.com\/en-au\/wp-content\/uploads\/sites\/4\/2021\/07\/image-2025-04-09T181015.055-150x150.jpg 150w, https:\/\/envistacorp.com\/en-au\/wp-content\/uploads\/sites\/4\/2021\/07\/image-2025-04-09T181015.055-60x60.jpg 60w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__badge\">White Paper<\/div>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/web.envistacorp.com\/are-managed-service-right-for-your-business\" target=&quot;_blank&quot;>\n\t\t\t\tAre Managed Services Right for Your Business?\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Gain insight into benefits and various use cases for infrastructure, application and business process managed services.<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/web.envistacorp.com\/are-managed-service-right-for-your-business\" aria-label=\"Read more about Are Managed Services Right for Your Business?\" tabindex=\"-1\" target=\"_blank\">\n\t\t\tDownload\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\n\n\n<h2 class=\"wp-block-heading\">Exposed Sensitive Information<\/h2>\n\n\n\n<p>In the office you should retrieve print jobs immediately when printing documents that contain sensitive information to a shared or public printer. Other users may grab these materials from the printer if they are left unattended and this can result in an accidental breach of confidential information. Even in instances where it would be \u201cno big deal,\u201d this is important to practise so that it becomes a habit.<\/p>\n\n\n\n<p>Materials containing sensitive information should always be disposed of in secure shred bins. This includes printed documents, CDs, and Mobile Flash drives. When disposing, recycling, or donating personal devices (laptops, desktop computers) that may have contained sensitive information about yourself (tax documents, medical records, banking information, etc.), remove and destroy the hard drives from these machines. This will prevent others from accessing materials that were stored on the device. Mobile devices should be reset to factory default settings before you dispose of them.<\/p>\n\n\n\n<p>Another tip that might seem to defy common courtesy is do not plug in USB drives that you find on the ground or in stored areas. This is often our first instinct to see if we can identify the owner of the device and return it to them, but attackers will drop devices that will install malware on your device.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Unlocked Computers<\/h2>\n\n\n\n<p>Finally, when traveling, keep your laptop locked and in the trunk of your vehicle. Every year the largest cause of reported data breaches is lost or stolen laptops. Criminals may break windows to steal a laptop if they can see it inside of your vehicle. It is also important to keep track of your laptop when at airports or while taking Uber, Lyft, or taxi rides.<\/p>\n\n\n\n<p>It is important to remember that you play as large a role in keeping your company secured as the IT department, even if it isn\u2019t something you think about at first blush. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>In today\u2019s rapidly advancing technology environment, new threats emerge every day which can prove problematic to your business.<\/p>\n","protected":false},"author":22,"featured_media":46005,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","_searchwp_excluded":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[3475],"tags":[3913,3769,3966],"class_list":["post-43373","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-cyber-security","tag-information-technology","tag-security-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IT Security Threats in the Office | enVista<\/title>\n<meta name=\"description\" content=\"In today\u2019s rapidly advancing technology environment, new threats emerge every day which can prove problematic to your business.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/envistacorp.com\/en-au\/2017\/06\/01\/it-security-threats-in-the-office\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT Security Threats in the Office | enVista\" \/>\n<meta property=\"og:description\" content=\"In today\u2019s rapidly advancing technology environment, new threats emerge every day which can prove problematic to your business.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/envistacorp.com\/en-au\/2017\/06\/01\/it-security-threats-in-the-office\/\" \/>\n<meta property=\"og:site_name\" content=\"enVista Australia\" \/>\n<meta property=\"article:published_time\" content=\"2017-06-01T16:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-03T13:18:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/envistacorp.com\/en-au\/wp-content\/uploads\/sites\/4\/2019\/08\/Security-image-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1890\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"enVista Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"enVista Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT Security Threats in the Office | enVista","description":"In today\u2019s rapidly advancing technology environment, new threats emerge every day which can prove problematic to your business.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/envistacorp.com\/en-au\/2017\/06\/01\/it-security-threats-in-the-office\/","og_locale":"en_US","og_type":"article","og_title":"IT Security Threats in the Office | enVista","og_description":"In today\u2019s rapidly advancing technology environment, new threats emerge every day which can prove problematic to your business.","og_url":"https:\/\/envistacorp.com\/en-au\/2017\/06\/01\/it-security-threats-in-the-office\/","og_site_name":"enVista Australia","article_published_time":"2017-06-01T16:00:00+00:00","article_modified_time":"2025-03-03T13:18:47+00:00","og_image":[{"width":2560,"height":1890,"url":"https:\/\/envistacorp.com\/en-au\/wp-content\/uploads\/sites\/4\/2019\/08\/Security-image-scaled.jpeg","type":"image\/jpeg"}],"author":"enVista Marketing","twitter_card":"summary_large_image","twitter_misc":{"Written by":"enVista Marketing","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/envistacorp.com\/en-au\/2017\/06\/01\/it-security-threats-in-the-office\/#article","isPartOf":{"@id":"https:\/\/envistacorp.com\/en-au\/2017\/06\/01\/it-security-threats-in-the-office\/"},"author":{"name":"enVista Marketing","@id":"https:\/\/envistacorp.com\/en-au\/#\/schema\/person\/c938d19b1c760a4e1c353086018cb894"},"headline":"IT Security Threats In The Office","datePublished":"2017-06-01T16:00:00+00:00","dateModified":"2025-03-03T13:18:47+00:00","mainEntityOfPage":{"@id":"https:\/\/envistacorp.com\/en-au\/2017\/06\/01\/it-security-threats-in-the-office\/"},"wordCount":624,"commentCount":0,"publisher":{"@id":"https:\/\/envistacorp.com\/en-au\/#organization"},"image":{"@id":"https:\/\/envistacorp.com\/en-au\/2017\/06\/01\/it-security-threats-in-the-office\/#primaryimage"},"thumbnailUrl":"https:\/\/envistacorp.com\/en-au\/wp-content\/uploads\/sites\/4\/2019\/08\/Security-image-scaled.jpeg","keywords":["Cyber Security","Information Technology","Security Management"],"articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/envistacorp.com\/en-au\/2017\/06\/01\/it-security-threats-in-the-office\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/envistacorp.com\/en-au\/2017\/06\/01\/it-security-threats-in-the-office\/","url":"https:\/\/envistacorp.com\/en-au\/2017\/06\/01\/it-security-threats-in-the-office\/","name":"IT Security Threats in the Office | enVista","isPartOf":{"@id":"https:\/\/envistacorp.com\/en-au\/#website"},"primaryImageOfPage":{"@id":"https:\/\/envistacorp.com\/en-au\/2017\/06\/01\/it-security-threats-in-the-office\/#primaryimage"},"image":{"@id":"https:\/\/envistacorp.com\/en-au\/2017\/06\/01\/it-security-threats-in-the-office\/#primaryimage"},"thumbnailUrl":"https:\/\/envistacorp.com\/en-au\/wp-content\/uploads\/sites\/4\/2019\/08\/Security-image-scaled.jpeg","datePublished":"2017-06-01T16:00:00+00:00","dateModified":"2025-03-03T13:18:47+00:00","description":"In today\u2019s rapidly advancing technology environment, new threats emerge every day which can prove problematic to your business.","breadcrumb":{"@id":"https:\/\/envistacorp.com\/en-au\/2017\/06\/01\/it-security-threats-in-the-office\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/envistacorp.com\/en-au\/2017\/06\/01\/it-security-threats-in-the-office\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/envistacorp.com\/en-au\/2017\/06\/01\/it-security-threats-in-the-office\/#primaryimage","url":"https:\/\/envistacorp.com\/en-au\/wp-content\/uploads\/sites\/4\/2019\/08\/Security-image-scaled.jpeg","contentUrl":"https:\/\/envistacorp.com\/en-au\/wp-content\/uploads\/sites\/4\/2019\/08\/Security-image-scaled.jpeg","width":2560,"height":1890,"caption":"A person uses a laptop with a digital graphic of a security shield and keyhole overlayed on the screen, symbolizing cybersecurity and data protection."},{"@type":"BreadcrumbList","@id":"https:\/\/envistacorp.com\/en-au\/2017\/06\/01\/it-security-threats-in-the-office\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/envistacorp.com\/en-au\/"},{"@type":"ListItem","position":2,"name":"IT Security Threats In The Office"}]},{"@type":"WebSite","@id":"https:\/\/envistacorp.com\/en-au\/#website","url":"https:\/\/envistacorp.com\/en-au\/","name":"enVista Australia","description":"Enabling Enterprise Commerce","publisher":{"@id":"https:\/\/envistacorp.com\/en-au\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/envistacorp.com\/en-au\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/envistacorp.com\/en-au\/#organization","name":"enVista Australia","url":"https:\/\/envistacorp.com\/en-au\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/envistacorp.com\/en-au\/#\/schema\/logo\/image\/","url":"https:\/\/envistacorp.com\/en-au\/wp-content\/uploads\/sites\/4\/2021\/10\/enVista_Logo_White-1.png","contentUrl":"https:\/\/envistacorp.com\/en-au\/wp-content\/uploads\/sites\/4\/2021\/10\/enVista_Logo_White-1.png","width":348,"height":152,"caption":"enVista Australia"},"image":{"@id":"https:\/\/envistacorp.com\/en-au\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/envistacorp.com\/en-au\/#\/schema\/person\/c938d19b1c760a4e1c353086018cb894","name":"enVista Marketing","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/908735372279b00297ea13e45a4947cdb05e2ee7244abfcfb3ea9d263679fa53?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/908735372279b00297ea13e45a4947cdb05e2ee7244abfcfb3ea9d263679fa53?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/908735372279b00297ea13e45a4947cdb05e2ee7244abfcfb3ea9d263679fa53?s=96&d=mm&r=g","caption":"enVista Marketing"},"description":"enVista was founded by supply chain and technology experts in response to market demand for skilled consulting services. Read posts by our Thought Leaders.","url":"https:\/\/envistacorp.com\/en-au\/author\/envistamarketing\/"}]}},"_links":{"self":[{"href":"https:\/\/envistacorp.com\/en-au\/wp-json\/wp\/v2\/posts\/43373","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/envistacorp.com\/en-au\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/envistacorp.com\/en-au\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/envistacorp.com\/en-au\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/envistacorp.com\/en-au\/wp-json\/wp\/v2\/comments?post=43373"}],"version-history":[{"count":0,"href":"https:\/\/envistacorp.com\/en-au\/wp-json\/wp\/v2\/posts\/43373\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/envistacorp.com\/en-au\/wp-json\/wp\/v2\/media\/46005"}],"wp:attachment":[{"href":"https:\/\/envistacorp.com\/en-au\/wp-json\/wp\/v2\/media?parent=43373"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/envistacorp.com\/en-au\/wp-json\/wp\/v2\/categories?post=43373"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/envistacorp.com\/en-au\/wp-json\/wp\/v2\/tags?post=43373"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}